On 2013-07-09 15:16, [email protected] wrote:
> User eric has just rebuilt a portable snapshot, available from:
> 
>         http://www.OpenSMTPD.org/archives/opensmtpd-201307091512p1.tar.gz
> 
> Checksum:
> 
>   SHA256 (opensmtpd-201307091512p1.tar.gz) =
>   c65cd5167b0c3488794b175911922a559acc4c44dc08818e7319639b10551475
> 
> A summary of the content of this snapshot is available below.
> 
> Please test and let us know if it breaks something!
> 
> If this snapshot doesn't work, please also test with a previous one,
> to help us spot where the issue is comming from. You can access all
> previous snapshots here:
> 
>         http://www.opensmtpd.org/archives/
> 
> The OpenSMTPD team ;-)
> 
> 
> Summary of changes since last snapshot (opensmtpd-201306271531p1):
> -----------------------------------------------------------------
> 
>   * Get rid of env->sc_pw and env->sc_pwqueue. Each process explicitly
>     fetch the user it needs.
>   * Move early queue initialization in queue_init(). Queue Backends now
>     take the queue passwd as parameter in their init functions.
>   * Fix a segfault in smtpctl in offline mode.
>   * Also apply the delay between transactions in the RSET case.
>   * New implementation for the command line parser and dispatching in smtpctl.
>     Allows richer syntax in the command line, and makes the code way simpler 
> to
>     follow and extend with new commands.
>   * Implement config options for fetch_source cache as for table_mysql.
>   * Unlink socket upon server shutdown
>   * Missing return in profiling code can cause truncated profiling keys
>     two be stored ... if we DO prefer that rather than losing the value,
>     we can rewrite as (void)bsnprintf();
>   * Only get the fetch response if result is 1.
>     Fix msg leak while there.
>   * Add config options for fetch_source cache.
>   * complete table_passwd.c
>   * TLS perfect forward secrecy with ecdhe

I'm slightly ignorant on this topic, so let me ask to be sure.
Do we need to *do* anything for PFS to work, (like use a specific type
of key?), or should it work out-of-the-box with any TLS key type?

Thanks

>   * Introduce expand string modifiers, diff by Colin Didier
> 
> -- 
> You received this email because you are subscribed to mailing list: 
> [email protected]
> To unsubscribe, send mail with subject:
>         [[email protected]] unregister

-- 
Hugo Osvaldo Barrera

Attachment: pgpXFcsZaYTRx.pgp
Description: PGP signature

Reply via email to